Exam 3: Computer and Internet Crime
Exam 1: An Overview of Ethics85 Questions
Exam 2: Ethics for It Workers and It Users75 Questions
Exam 3: Computer and Internet Crime89 Questions
Exam 4: Privacy90 Questions
Exam 5: Freedom of Expression90 Questions
Exam 6: Intellectual Property90 Questions
Exam 7: Software Development75 Questions
Exam 8: The Impact of Information Technology on Productivity and Quality of Life90 Questions
Exam 9: Social Networking90 Questions
Exam 10: Ethics of It Organizations90 Questions
Select questions type
Debit and credit cards which contain a memory chip that is updated with encrypted data every time the cards are used are called .
(Short Answer)
4.8/5
(32)
A(n) is a security incident prevention tool that evaluates whether an organization has a well-considered security policy in place and if it is being followed.
(Short Answer)
4.9/5
(29)
An antivirus software scans for a specific sequence of bytes, known as a , that indicates the presence of specific malware.
(Multiple Choice)
4.8/5
(38)
According to the 2010/11 CSI Computer Crime and Security Survey, malware infection incidents were the most common security incident.
(True/False)
4.8/5
(33)
Smart and talented hackers who are technically inept are referred to as lamers or script kiddies by more skilled hackers.
(True/False)
4.9/5
(37)
The policy is a template available from the SANS Institute that defines the means to establish a culture of openness, trust, and integrity in business practices.
(Multiple Choice)
4.8/5
(36)
The regulates the collection of the content of wire and electronic communications.
(Multiple Choice)
4.8/5
(31)
Installation of a corporate firewall is the least common security precaution taken by businesses as it does not provide sufficient security.
(True/False)
4.9/5
(35)
The process of assessing securityrelated risks from both internal and external threats to an organization's computers
and networks is called .
(Short Answer)
5.0/5
(40)
A(n) works by using the Internet to relay communications; it maintains privacy through security procedures and tunneling protocols, which encrypt data at the sending end and decrypt it at the receiving end.
(Multiple Choice)
4.8/5
(36)
People who use illegal means to obtain trade secrets from a competitor are called .
(Short Answer)
4.9/5
(27)
are poorly trained and inadequately managed employees who mean well but have the potential to cause much damage.
(Multiple Choice)
4.7/5
(36)
is the act of fraudulently using email to try to get the recipient to reveal personal data.
(Multiple Choice)
4.9/5
(34)
The use of cloud computing and virtualization software has significantly reduced computer security concerns.
(True/False)
4.8/5
(32)
The cost to repair the worldwide damage done by a computer worm has exceeded $1 billion on more than one occasion.
(True/False)
5.0/5
(30)
operates in a software layer that runs on top of the operating system.
(Short Answer)
5.0/5
(33)
test the limitations of information systems out of intellectual curiosity to see whether they can gain access and how far they can go.
(Multiple Choice)
4.9/5
(36)
detracts recipients from the ability of recipients to communicate effectively due to full mailboxes and relevant emails being hidden among many unsolicited messages.
(Short Answer)
4.9/5
(34)
The cooperation between an employee of a company and an outsider to commit fraud against the company is called
_____.
(Short Answer)
4.8/5
(43)
Showing 61 - 80 of 89
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)